0:00:10.000,0:00:14.000 Thank you. Congratulations to the students [br][of the Digital Freedoms association] 0:00:14.100,0:00:16.000 who organized this meeting. 0:00:16.100,0:00:19.900 They are right, not only[br]because Richard is famous 0:00:20.000,0:00:22.200 but also because the subject[br]is very interesting to us. 0:00:22.300,0:00:25.000 They are especially interesting[br]here at Sciences Po 0:00:25.100,0:00:29.200 since first, we try to study[br]controversies; 0:00:29.300,0:00:31.200 some of you here have studied[br]controversies 0:00:31.300,0:00:34.100 and Richard himself[br]is a controversial character. 0:00:34.200,0:00:37.000 I have not found anything on the Web[br]that allows to find consensus 0:00:37.100,0:00:45.100 nor about what he does, nor what he says, nor[br]the words he uses, so he's an ideal case study 0:00:45.200,0:00:48.700 for us who study cartographies of[br]controversies in this institution. 0:00:48.800,0:00:51.700 Somehow we have a controversial character 0:00:51.800,0:00:53.700 on subjects that are important to us. 0:00:53.800,0:00:56.800 Second, obviously, is the subject itself 0:00:56.900,0:01:01.000 and the question of how much[br]freedom and control 0:01:04.650,0:01:08.200 that are at the core of all these[br]digital innovations 0:01:08.300,0:01:11.000 are directly interesting, for political science 0:01:11.100,0:01:14.300 sociology, also law. 0:01:14.400,0:01:18.000 All questions that interest us[br]in this institution. 0:01:18.100,0:01:21.800 It's by the way interesting that[br]Richard comes here 0:01:21.900,0:01:28.100 a few days after Steve Jobs died, a death that [br]he celebrated in his own way if I dare to say 0:01:28.200,0:01:32.200 explaining that his loss was not[br]a huge disaster 0:01:32.300,0:01:36.100 for all those questions of[br]digital freedoms 0:01:36.200,0:01:40.000 because - even though Steve Jobs[br]could be esteemed 0:01:40.100,0:01:42.800 the control he had on software 0:01:42.900,0:01:47.000 and its domination make us[br]in some way free 0:01:47.100,0:01:51.000 but under the form, as he says it[br]in several opinions, 0:01:51.100,0:01:54.200 of a "jail made cool" --[br]a jail that I like myself 0:01:54.300,0:01:56.600 since I am myself an adept[br]of the Macintosh 0:01:56.700,0:01:59.000 but this is obviously not[br]the kind of character 0:01:59.100,0:02:01.600 or the kind of freedom that Richard[br]is thinking about. 0:02:01.700,0:02:04.000 The third reason is that, obviously 0:02:04.100,0:02:06.700 for a lot of questions[br]that are directly interesting to us 0:02:06.800,0:02:09.000 in this institution about[br]scientific humanities 0:02:09.100,0:02:11.700 is the link between technical innovation 0:02:11.800,0:02:14.700 and political devices[br]that interests us directly. 0:02:14.800,0:02:17.700 So we have at least, anyway myself[br]at the scientific direction 0:02:17.800,0:02:23.000 three reasons to enjoy[br]the initiative of the students group 0:02:23.100,0:02:25.000 which organized this meeting 0:02:25.100,0:02:28.000 and I am happy to let[br]Richard Stallman speak 0:02:28.100,0:02:31.100 and please applause him before. 0:02:37.700,0:02:43.100 Projects with the goal of digital[br]inclusion are making a big assumption. 0:02:43.200,0:02:48.600 They are assuming that participating[br]in a digital society is good; 0:02:48.700,0:02:51.000 but that’s not necessarily true. 0:02:51.100,0:02:54.800 Being in a digital society can be good or bad 0:02:54.900,0:03:00.800 depending on whether that[br]digital society is just or unjust. 0:03:02.000,0:03:09.000 There are many ways in which our freedom[br]is being attacked by digital technology. 0:03:09.100,0:03:17.100 Digital technology can make things worse,[br]and it will, unless we fight to prevent it. 0:03:20.900,0:03:26.000 Therefore, if we have an unjust digital society 0:03:26.100,0:03:30.000 we should cancel these projects[br]for digital inclusion 0:03:30.100,0:03:34.000 and launch projects for digital extraction. 0:03:34.500,0:03:41.400 We have to extract people from digital society[br]if it doesn’t respect their freedom; 0:03:41.500,0:03:44.800 or we have to make it respect their freedom. 0:03:45.100,0:03:50.000 So, what are the threats? First, surveillance. 0:03:50.100,0:03:54.000 Computers are Stalin’s dream. 0:03:54.100,0:03:57.600 They are ideal tools for surveillance 0:03:57.700,0:04:03.000 because anything we do with computers,[br]the computers can record. 0:04:03.100,0:04:05.000 They can record the information 0:04:05.100,0:04:10.900 in a perfectly indexed[br]searchable form in a central database 0:04:11.000,0:04:17.100 ideal for any tyrant[br]who wants to crush opposition. 0:04:19.800,0:04:24.100 Surveillance is sometimes done[br]with our own computers. 0:04:24.700,0:04:30.000 For instance, if you have a computer[br]that’s running Microsoft Windows 0:04:30.100,0:04:33.000 that system is doing surveillance. 0:04:33.100,0:04:38.300 There are features in Windows[br]that send data to some server. 0:04:38.400,0:04:41.000 Data about the use of the computer. 0:04:41.100,0:04:45.700 A surveillance feature was discovered[br]in the iPhone a few months ago 0:04:45.800,0:04:48.800 and people started calling it[br]the “spy-phone”. 0:04:51.000,0:04:54.600 Flash player has a surveillance feature too 0:04:54.800,0:04:58.200 and so does the Amazon “Swindle”. 0:04:58.700,0:05:04.000 They call it the Kindle,[br]but I call it the Swindle, l’escroc 0:05:04.500,0:05:08.200 because it’s meant to swindle[br]users out of their freedom. 0:05:08.800,0:05:14.000 It makes people identify themselves[br]whenever they buy a book 0:05:14.200,0:05:21.000 and that means Amazon has a giant list[br]of all the books each user has read. 0:05:21.400,0:05:25.100 And such a list must not exist anywhere. 0:05:27.100,0:05:32.000 Most portable phones[br]will transmit their location 0:05:32.100,0:05:38.100 computed using GPS, on remote command. 0:05:38.900,0:05:45.900 And the phone company is accumulating[br]a giant list of places that the user has been. 0:05:46.100,0:05:51.100 A German from the Green Party[br]asked the phone company 0:05:51.200,0:05:56.000 to give him the data it had[br]about where he was. 0:05:56.500,0:05:59.800 He had to sue, he had to go[br]to court to get this information. 0:05:59.900,0:06:06.000 And when he got it, he received[br]forty-four thousand location points 0:06:06.100,0:06:08.100 for a period of six months. 0:06:08.200,0:06:12.400 That’s more than two hundred per day. 0:06:12.800,0:06:20.000 So what that means is someone could form[br]a very good picture of his activities 0:06:20.100,0:06:24.000 just by looking at that data. 0:06:28.000,0:06:32.800 We can stop our own computers[br]from doing surveillance on us 0:06:32.900,0:06:37.100 if we have control[br]of the software that they run. 0:06:38.000,0:06:43.000 But the software these people are running,[br]they don’t have control over. 0:06:43.100,0:06:49.100 It’s non-free software and that’s why[br]it has malicious features, such as surveillance. 0:06:49.700,0:06:54.600 However, the surveillance is not[br]always done with our own computers 0:06:54.700,0:06:57.700 it’s also done at one remove. 0:06:57.800,0:07:02.100 For instance ISPs in Europe are required 0:07:02.200,0:07:09.000 to keep data about the user’s[br]internet communications for a long time 0:07:09.100,0:07:16.100 in case the State decides to investigate[br]that person later 0:07:16.200,0:07:19.100 for whatever imaginable reason. 0:07:22.000,0:07:26.900 And with a portable phone,[br]even if you can stop the phone 0:07:27.000,0:07:30.000 from transmitting your GPS location 0:07:30.100,0:07:34.100 the system can determine[br]the phone’s location approximately 0:07:34.200,0:07:40.700 by comparing the time when[br]the signals arrive at different towers. 0:07:41.000,0:07:45.000 So the phone system can do surveillance 0:07:45.100,0:07:49.400 even without special cooperation[br]from the phone itself. 0:07:54.000,0:07:59.700 Likewise, the bicycles[br]that people rent in Paris. 0:07:59.800,0:08:02.900 Of course the system knows[br]where you get the bicycle 0:08:03.000,0:08:06.000 and it knows where you return the bicycle 0:08:06.000,0:08:10.000 and I’ve heard reports[br]that it tracks the bicycles 0:08:10.600,0:08:14.000 as they are moving around as well. 0:08:15.100,0:08:23.000 So they are not something we can really trust. 0:08:23.300,0:08:30.900 But there are also systems that have nothing[br]to do with us that exist only for tracking. 0:08:31.000,0:08:37.800 For instance, in the UK[br]all car travel is monitored. 0:08:37.900,0:08:43.500 Every car’s movements[br]are being recorded in real time 0:08:43.600,0:08:47.200 and can be tracked by the State in real time. 0:08:47.300,0:08:52.000 This is done with cameras on the side of the road. 0:08:52.400,0:08:57.100 Now, the only way we can prevent surveillance 0:08:57.200,0:09:01.000 that’s done at one remove[br]or by unrelated systems 0:09:01.100,0:09:07.100 is through political action[br]against increased government power 0:09:07.200,0:09:11.100 to track and monitor everyone. 0:09:11.500,0:09:17.000 Which means of course we have to reject[br]whatever excuse they come up with. 0:09:18.000,0:09:25.000 For doing such systems, no excuse[br]is valid to monitor everyone. 0:09:25.600,0:09:31.800 In a free society, when you go out[br]in public you are not guaranteed anonymity. 0:09:31.900,0:09:36.500 It’s possible for someone[br]to recognize you and remember. 0:09:36.600,0:09:41.800 And later that person could say[br]that he saw you at a certain place. 0:09:42.000,0:09:45.000 But that information is diffuse. 0:09:45.100,0:09:52.000 It’s not conveniently assembled to track[br]everybody and investigate what they did. 0:09:52.100,0:09:55.700 To collect that information is a lot of work 0:09:55.800,0:10:01.000 so it’s only done in special cases[br]when it’s necessary. 0:10:02.800,0:10:06.000 But computerized surveillance[br]makes it possible 0:10:06.100,0:10:09.800 to centralize and index all this information 0:10:09.900,0:10:16.900 so that an unjust regime can find it all[br]and find out all about everyone. 0:10:17.000,0:10:21.000 If a dictator takes power,[br]which could happen anywhere 0:10:21.400,0:10:25.500 people realize this and they recognize 0:10:25.600,0:10:31.500 that they should not[br]communicate with other dissidents 0:10:31.600,0:10:36.000 in a way that the State could find out about. 0:10:36.100,0:10:40.400 But if the dictator[br]has several years of stored records 0:10:40.500,0:10:46.000 of who talks with whom, it’s too late[br]to take any precautions then. 0:10:46.300,0:10:51.000 Because he already has[br]everything he needs to realize 0:10:51.100,0:10:56.000 “OK this guy is a dissident and he spoke[br]with him. Maybe he is a dissident too.” 0:10:56.100,0:11:00.100 “Maybe we should grab him and torture him.” 0:11:02.000,0:11:11.800 So we need to campaign to put[br]an end to digital surveillance now. 0:11:12.000,0:11:17.300 You can’t wait until there is a dictator[br]and it would really matter. 0:11:17.600,0:11:26.000 And besides, it doesn’t take an outright[br]dictatorship to start attacking human rights. 0:11:27.000,0:11:31.600 I wouldn’t quite call[br]the government of the UK a dictatorship. 0:11:31.700,0:11:39.000 It’s not very democratic and one way[br]it crushes democracy is using surveillance. 0:11:39.100,0:11:45.000 A few years ago, people believed to be[br]on their way to a protest 0:11:45.100,0:11:47.000 they were going to protest. 0:11:47.100,0:11:50.000 They were arrested before[br]they could get there 0:11:50.100,0:11:58.000 because their car was tracked through[br]this universal car tracking system. 0:12:03.900,0:12:07.000 The second threat is censorship. 0:12:07.100,0:12:11.700 Censorship is not new,[br]it existed long before computers. 0:12:11.800,0:12:17.700 But 15 years ago, we thought that[br]the Internet would protect us from censorship 0:12:17.800,0:12:20.700 that it would defeat censorship. 0:12:20.800,0:12:25.000 Then, China and some other obvious tyrannies 0:12:25.100,0:12:30.800 went to great lengths to impose[br]censorship on the Internet, and we said: 0:12:30.900,0:12:34.800 “well that’s not surprising, what else[br]would governments like that do?” 0:12:34.900,0:12:39.000 But today we see censorship[br]imposed in countries 0:12:39.100,0:12:44.900 that are not normally[br]thought of as dictatorships 0:12:45.000,0:12:53.300 such as for instance the UK, France,[br]Spain, Italy, Denmark… 0:12:54.400,0:13:00.700 They all have systems of[br]blocking access to some websites. 0:13:00.900,0:13:04.000 Denmark established a system 0:13:04.100,0:13:10.900 that blocks access to a long list[br]of webpages, which was secret. 0:13:11.000,0:13:15.800 The citizens were not supposed to know[br]how the government was censoring them 0:13:15.900,0:13:19.800 but the list was leaked,[br]and posted on WikiLeaks. 0:13:19.900,0:13:26.000 At that point, Denmark added[br]the WikiLeaks page to its censorship list. 0:13:27.500,0:13:30.000 So, the whole rest of the world can find out 0:13:30.100,0:13:35.000 how Danes are being censored,[br]but Danes are not supposed to know. 0:13:35.900,0:13:43.800 A few months ago, Turkey,[br]which claims to respect some human rights 0:13:43.900,0:13:47.000 announced that every Internet user 0:13:47.100,0:13:51.000 would have to choose between[br]censorship and more censorship. 0:13:51.500,0:13:54.900 Four different levels of censorship[br]they get to choose! 0:13:55.000,0:14:02.000 But freedom is not one of the options. 0:14:04.400,0:14:09.100 Australia wanted to impose filtering[br]on the Internet but that was blocked. 0:14:09.200,0:14:13.000 However Australia has a[br]different kind of censorship. 0:14:13.100,0:14:15.900 It has censorship of links. 0:14:16.000,0:14:20.500 That is, if a website in Australia has a link 0:14:20.600,0:14:23.900 to some censored site outside Australia 0:14:24.000,0:14:27.000 the one in Australia can be punished. 0:14:27.100,0:14:29.000 Electronic Frontier Australia 0:14:29.100,0:14:32.900 which is an organization[br]that defends human rights 0:14:33.000,0:14:36.700 in the digital domain in Australia 0:14:36.800,0:14:41.200 posted a link to[br]a foreign political website. 0:14:41.900,0:14:49.000 It was ordered to delete the link[br]or face a penalty of $11,000 a day. 0:14:49.500,0:14:52.000 So they deleted it,[br]what else could they do? 0:14:52.100,0:14:55.800 This is a very harsh system of censorship. 0:14:55.900,0:15:01.800 In Spain, the censorship[br]that was adopted earlier this year 0:15:02.000,0:15:12.700 allows officials to arbitrarily[br]shut down an Internet site in Spain 0:15:12.800,0:15:17.400 or impose filtering to block access[br]to a site outside of Spain. 0:15:17.500,0:15:22.000 And they can do this[br]without any kind of trial. 0:15:22.100,0:15:27.000 This was one of the motivations[br]for the Indignados 0:15:29.400,0:15:33.000 who have been protesting in the street. 0:15:34.300,0:15:38.800 There were protests in the street[br]in Turkey as well after that announcement 0:15:38.900,0:15:42.800 but the government refused to change its policy. 0:15:42.900,0:15:46.600 We must recognize that a country 0:15:46.700,0:15:50.800 that imposes censorship on the Internet[br]is not a free country. 0:15:51.000,0:15:57.000 And is not a legitimate government either. 0:16:05.800,0:16:13.300 The next threat to our freedom comes[br]from data formats that restrict the users. 0:16:13.900,0:16:17.000 Sometimes it’s because the format is secret. 0:16:17.100,0:16:20.000 There are many application programs 0:16:20.100,0:16:25.000 that save the user’s data in a secret format 0:16:25.900,0:16:28.800 which is meant to prevent the user 0:16:28.900,0:16:33.000 from taking that data and using it[br]with some other program. 0:16:33.100,0:16:38.000 The goal is to prevent interoperability. 0:16:38.700,0:16:45.000 Now evidently, if the program[br]implements a secret format 0:16:45.100,0:16:48.800 that’s because the program[br]is not free software. 0:16:48.900,0:16:51.900 So this is another kind of malicious feature. 0:16:52.000,0:16:55.100 Surveillance is one kind of malicious feature 0:16:55.200,0:16:58.900 that you find in some non-free programs; 0:16:59.000,0:17:01.900 using secret formats to restrict the users 0:17:02.000,0:17:04.900 is another kind of malicious feature 0:17:05.000,0:17:09.000 that you also find in some non-free programs. 0:17:10.000,0:17:15.000 But if you have a free program[br]that handles a certain format 0:17:15.900,0:17:19.000 ipso facto that format is not secret. 0:17:19.100,0:17:26.000 This kind of malicious feature[br]can only exist in a non-free program. 0:17:26.300,0:17:31.100 Surveillance features could theoretically[br]exist in a free program 0:17:31.200,0:17:35.000 but you don’t find them happening. 0:17:35.500,0:17:37.900 Because the users would fix it. 0:17:38.000,0:17:42.000 The users wouldn’t like this,[br]so they would fix it. 0:17:45.000,0:17:53.700 In any case, we also find secret data[br]formats in use for publication of works. 0:17:53.900,0:17:58.700 You find secret data formats[br]in use for audio 0:17:58.800,0:18:02.800 such as music, for video, for books… 0:18:03.000,0:18:11.000 And these secret formats are known as[br]Digital Restrictions Management, or DRM 0:18:11.500,0:18:16.400 or digital handcuffs (les menottes numériques). 0:18:19.000,0:18:23.200 So, the works are published in secret formats 0:18:23.300,0:18:27.900 so that only proprietary[br]programs can play them 0:18:28.000,0:18:35.700 so that these proprietary programs can have[br]the malicious feature of restricting the users 0:18:35.800,0:18:40.000 stopping them from doing something[br]that would be natural to do. 0:18:44.600,0:18:49.900 And this is used even by public entities[br]to communicate with the people. 0:18:50.000,0:18:56.400 For instance Italian public television[br]makes its programs available on the net 0:18:56.500,0:18:59.000 in a format called VC-1 0:18:59.100,0:19:05.000 which is a standard supposedly,[br]but it’s a secret standard. 0:19:06.500,0:19:12.000 Now I can’t imagine how any[br]publicly supported entity 0:19:12.100,0:19:17.800 could justify using a secret format[br]to communicate with the public. 0:19:17.900,0:19:20.800 This should be illegal. 0:19:20.900,0:19:25.100 In fact I think all use of Digital[br]Restrictions Management should be illegal. 0:19:25.200,0:19:29.000 No company should be allowed to do this. 0:19:31.600,0:19:35.700 There are also formats that are not secret 0:19:35.800,0:19:41.000 but almost might as well be[br]secret, for instance Flash. 0:19:42.500,0:19:49.300 Flash is not actually secret but Adobe keeps[br]making new versions, which are different 0:19:49.400,0:19:57.000 faster than anyone can keep up[br]and make free software to play those files. 0:19:57.100,0:20:01.000 So it has almost the same effect as being secret. 0:20:02.800,0:20:11.100 Then there are the patented formats,[br]such as MP3 for audio. 0:20:11.200,0:20:16.100 It’s bad to distribute audio in MP3 format! 0:20:16.600,0:20:21.900 There is free software to handle MP3 format,[br]to play it and to generate it 0:20:22.000,0:20:25.600 but because it’s patented in many countries 0:20:25.700,0:20:31.900 many distributors of free software[br]don’t dare include those programs. 0:20:32.000,0:20:35.800 So if they distribute the GNU+Linux system 0:20:35.900,0:20:39.800 their system doesn’t include a player for MP3. 0:20:39.900,0:20:48.000 As a result if anyone[br]distributes some music in MP3 0:20:48.100,0:20:54.700 that’s putting pressure on people[br]not to use GNU/Linux. 0:20:54.800,0:20:58.500 Sure, if you’re an expert you can find[br]a free software and install it 0:20:58.600,0:21:00.800 but there are lots of non experts 0:21:00.900,0:21:04.800 and they might see that[br]they installed a version of GNU/Linux 0:21:04.900,0:21:09.800 which doesn’t have that software[br]and it won’t play MP3 files 0:21:09.900,0:21:12.500 and they think it’s the system’s fault. 0:21:12.600,0:21:18.800 They don’t realize it’s MP3′s fault.[br]But this is the fact. 0:21:18.900,0:21:25.300 Therefore, if you want to support freedom,[br]don’t distribute MP3 files. 0:21:25.400,0:21:29.900 That’s why I say if you’re recording my speech[br]and you want to distribute copies 0:21:30.000,0:21:38.800 don’t do it in a patented format[br]such as MPEG-2, or MPEG-4, or MP3. 0:21:38.900,0:21:49.000 Use a format friendly to free software,[br]such as the Ogg format or WebM. 0:21:50.500,0:21:54.000 And by the way, if you are going[br]to distribute copies of the recording 0:21:54.100,0:22:01.000 please put on it the[br]Creative Commons-No derivatives license. 0:22:01.100,0:22:04.000 This is a statement of my personal views. 0:22:04.100,0:22:09.000 If it were a lecture for a course,[br]if it were didactic 0:22:09.100,0:22:14.000 then it ought to be free,[br]but statements of opinion are different. 0:22:23.900,0:22:26.800 Now this leads me to the next threat 0:22:26.900,0:22:32.200 which comes from software[br]that the users don’t have control over. 0:22:32.900,0:22:37.800 In other words: software[br]that isn’t free, that is not “libre”. 0:22:37.900,0:22:42.000 In this particular point[br]French is clearer than English. 0:22:42.100,0:22:46.000 The English word free[br]means ‘libre’ and ‘gratuit’ 0:22:46.100,0:22:52.800 but what I mean when I say free software[br]is ‘logiciel libre‘. I don’t mean ‘gratuit’. 0:22:52.900,0:22:54.900 I’m not talking about price. 0:22:55.000,0:23:01.000 Price is a side issue, just a detail,[br]because it doesn't matter ethically. 0:23:01.100,0:23:04.000 You know if I have a copy of a program 0:23:04.100,0:23:10.100 and I sell it to you for one euro[br]or a hundred euros, who cares? 0:23:10.200,0:23:14.000 Why should anyone think[br]that that’s good or bad? 0:23:14.100,0:23:20.900 Or suppose I gave it to you ‘gratuitement’…[br]still, who cares? 0:23:21.000,0:23:26.800 But whether this program respects[br]your freedom, that’s important! 0:23:26.900,0:23:31.500 So free software is software[br]that respects users’ freedom. 0:23:31.900,0:23:34.000 What does this mean? 0:23:34.100,0:23:37.800 Ultimately there are just[br]two possibilities with software: 0:23:37.900,0:23:44.000 either the users control the program[br]or the program controls the users. 0:23:44.100,0:23:48.000 If the users have certain essential freedoms 0:23:48.100,0:23:51.300 then they control the program 0:23:51.400,0:23:57.000 and those freedoms are[br]the criterion for free software. 0:23:57.900,0:24:01.800 But if the users don’t fully[br]have the essential freedoms 0:24:01.900,0:24:04.900 then the program controls the users. 0:24:05.000,0:24:12.000 But somebody controls that program[br]and, through it, has power over the users. 0:24:12.100,0:24:16.800 So, a non-free program is an instrument 0:24:16.900,0:24:21.700 to give somebody power[br]over a lot of other people 0:24:21.800,0:24:26.300 and this is unjust power[br]that nobody should ever have. 0:24:26.400,0:24:36.600 This is why non-free software, les logiciels[br]privateurs, qui privent de la liberté 0:24:37.000,0:24:42.000 why proprietary software is[br]an injustice and should not exist? 0:24:43.000,0:24:46.900 Because it leaves the users without freedom. 0:24:47.000,0:24:51.800 Now, the developer who has[br]control of the program 0:24:51.900,0:24:56.900 often feels tempted[br]to introduce malicious features 0:24:57.000,0:25:01.600 to further exploit or abuse those users. 0:25:01.700,0:25:05.400 He feels a temptation because[br]he knows he can get away with it: 0:25:05.500,0:25:08.800 because his program controls the users 0:25:08.900,0:25:11.700 and the users do not have[br]control of the program. 0:25:11.800,0:25:16.600 If he puts in a malicious feature,[br]the users can’t fix it; 0:25:16.700,0:25:19.600 they can’t remove the malicious feature. 0:25:19.700,0:25:22.800 I’ve already told you about[br]two kinds of malicious features: 0:25:22.900,0:25:26.800 surveillance features,[br]such as are found in Windows 0:25:26.900,0:25:32.100 and the iPhone and Flash player[br]and the “Swindle”. 0:25:35.000,0:25:40.000 And there are also[br]features to restrict users 0:25:40.200,0:25:42.800 which work with secret data formats 0:25:42.900,0:25:49.800 and those are found in Windows,[br]Macintosh, the iPhone, Flash player 0:25:49.900,0:25:58.000 the Amazon “Swindle”, the Playstation 3[br]and lots and lots of other programs. 0:26:00.000,0:26:04.000 The other kind of malicious[br]feature is the backdoor. 0:26:04.100,0:26:07.000 That means something in that program 0:26:07.100,0:26:11.600 is listening for remote[br]commands and obeying them 0:26:11.700,0:26:16.000 and those commands can mistreat the user. 0:26:16.100,0:26:26.000 We know of backdoors in Windows,[br]in the iPhone, in the Amazon “Swindle”. 0:26:26.700,0:26:33.800 The Amazon “Swindle” has a backdoor[br]that can remotely delete books. 0:26:33.900,0:26:38.900 We know this by observation,[br]because Amazon did it: 0:26:39.000,0:26:46.900 in 2009 Amazon remotely deleted[br]thousands of copies of a particular book. 0:26:47.000,0:26:52.900 Those were authorized copies, people[br]had obtain them directly from Amazon 0:26:53.000,0:26:58.200 and thus Amazon knew exactly where they were. 0:26:58.800,0:27:03.700 Which is how Amazon knew where[br]to send the commands to delete those books. 0:27:03.800,0:27:11.800 You know which book Amazon deleted? 0:27:12.000,0:27:18.000 It’s a book everyone should read[br]because it discusses a totalitarian state 0:27:18.100,0:27:22.100 that did things like[br]delete books it didn’t like. 0:27:22.700,0:27:28.000 Everybody should read it,[br]but not on the Amazon “Swindle”. 0:27:31.000,0:27:39.900 Anyway, malicious features are present[br]in the most widely used non-free programs 0:27:40.000,0:27:46.800 but they are rare in free software, because[br]with free software the users have control: 0:27:47.000,0:27:50.000 they can read the source code[br]and they can change it. 0:27:50.100,0:27:53.900 So, if there were a malicious feature 0:27:54.000,0:27:58.000 somebody would sooner or later[br]spot it and fix it. 0:27:58.100,0:28:01.800 This means that somebody who is considering 0:28:01.900,0:28:06.300 introducing a malicious feature[br]does not find it so tempting 0:28:06.400,0:28:09.800 because he knows he might[br]get away with it for a while 0:28:09.900,0:28:12.900 but somebody will spot it, will fix it 0:28:13.000,0:28:18.200 and everybody will loose[br]trust in the perpetrator. 0:28:18.900,0:28:23.400 It’s not so tempting when[br]you know you’re going to fail. 0:28:23.800,0:28:29.000 And that’s why we find that malicious[br]features are rare in free software 0:28:29.000,0:28:34.000 and common in proprietary software. 0:28:35.000,0:28:39.600 Now the essential freedoms are four. 0:28:39.700,0:28:44.000 Freedom 0 is the freedom[br]to run the program as you wish. 0:28:44.100,0:28:49.800 Freedom 1 is the freedom to study[br]the source code and change it 0:28:49.900,0:28:54.000 so the program does[br]your computing the way you wish. 0:28:54.800,0:28:58.000 Freedom 2 is the freedom to help others. 0:28:58.100,0:29:03.600 That’s the freedom to make exact copies[br]and redistribute them when you wish. 0:29:03.700,0:29:09.000 Freedom 3 is the freedom[br]to contribute to your community. 0:29:09.100,0:29:13.700 That’s the freedom to make copies[br]of your modified versions 0:29:13.800,0:29:20.800 if you have made any, and then[br]distribute them to others when you wish. 0:29:21.000,0:29:27.700 These freedoms, in order to be adequate,[br]must apply to all activities of life. 0:29:27.800,0:29:34.000 For instance if it says: “This is free[br]for academic use”, it’s not free. 0:29:34.100,0:29:38.400 Because that’s too limited.[br]It doesn’t apply to all areas of life. 0:29:38.500,0:29:42.000 In particular, if a program is free 0:29:42.100,0:29:47.900 that means it can be modified[br]and distributed commercially 0:29:48.000,0:29:53.000 because commerce is an area of life,[br]an activity in life. 0:29:53.100,0:29:56.900 And this freedom has to apply to all activities. 0:29:57.000,0:30:03.700 Now however, it’s not obligatory[br]to do any of these things. 0:30:03.800,0:30:07.900 The point is you’re free to do them[br]if you wish, when you wish. 0:30:08.000,0:30:12.600 But you never have to do them.[br]You don’t have to do any of them. 0:30:12.700,0:30:14.600 You don’t have to run the program. 0:30:14.700,0:30:17.000 You don’t have to study[br]or change the source code. 0:30:17.100,0:30:20.000 You don’t have to make any copies. 0:30:20.100,0:30:22.800 You don’t have to distribute[br]your modified versions. 0:30:22.900,0:30:28.000 The point is you should be free[br]to do those things if you wish. 0:30:29.000,0:30:34.000 Now, freedom number 1, the freedom to study[br]and change the source code 0:30:34.100,0:30:37.900 to make the program do[br]your computing as you wish 0:30:38.000,0:30:41.900 includes something[br]that might not be obvious at first. 0:30:42.000,0:30:46.200 If the program comes in a product 0:30:47.000,0:30:51.900 and a developer can provide[br]an upgrade that will run 0:30:52.000,0:30:56.800 then you have to be able to make[br]your version run in that product. 0:30:56.900,0:31:00.900 If the product would only run[br]the developer’s versions 0:31:01.000,0:31:07.000 and refuses to run yours, the executable[br]in that product is not free software. 0:31:07.300,0:31:10.800 Even if it was compiled from free source code 0:31:10.900,0:31:13.800 it’s not free because[br]you don’t have the freedom 0:31:13.900,0:31:18.000 to make the program do your computing[br]the way you wish. 0:31:18.500,0:31:23.000 So, freedom 1 has to be real,[br]not just theoretical. 0:31:23.100,0:31:27.000 It has to include the freedom[br]to use your version 0:31:27.100,0:31:31.800 not just the freedom to make[br]some source code that won’t run. 0:31:33.000,0:31:37.000 I launched the free software movement in 1983 0:31:37.500,0:31:40.000 when I announced the plan to develop 0:31:40.100,0:31:44.400 a free software operating system[br]whose name is GNU. 0:31:45.400,0:31:50.000 Now GNU, the name GNU, is a joke. 0:31:51.500,0:31:54.000 Because part of the hacker’s spirit 0:31:54.100,0:31:58.800 is to have fun even when[br]you’re doing something very serious. 0:31:58.900,0:32:06.800 Now I can’t think of anything more seriously[br]important than defending freedom. 0:32:11.800,0:32:16.000 But that didn’t mean I couldn’t give[br]my system a name that’s a joke. 0:32:20.000,0:32:24.000 So GNU is a joke because[br]it’s a recursive acronym 0:32:24.100,0:32:31.000 it stands for “GNU is Not Unix”,[br]so G.N.U.: GNU’s Not Unix. 0:32:31.100,0:32:35.000 So the G in GNU stands for GNU. 0:32:36.000,0:32:39.000 Now in fact this was[br]a tradition at the time. 0:32:39.100,0:32:43.900 The tradition was:[br]if there was an existing program 0:32:44.000,0:32:48.500 and you wrote something[br]similar to it, inspired by it 0:32:48.600,0:32:52.500 you could give credit[br]by giving your program a name 0:32:52.600,0:32:57.200 that’s a recursive acronym[br]saying it’s not the other one. 0:32:58.000,0:33:03.000 So I gave credit to Unix for[br]the technical ideas of Unix 0:33:03.300,0:33:09.700 but with the name GNU, because I decided[br]to make GNU a Unix-like system 0:33:09.800,0:33:15.700 with the same commands, the same system calls[br]so that it would be compatible 0:33:15.800,0:33:19.800 so that people who used Unix[br]can switch over easily. 0:33:19.900,0:33:23.800 But the reason for developing GNU,[br]that was unique. 0:33:23.900,0:33:28.600 GNU is the only operating system,[br]as far as I know 0:33:28.700,0:33:33.300 ever developed for the purpose of freedom. 0:33:33.400,0:33:37.700 Not for technical motivations,[br]not for commercial motivations. 0:33:37.800,0:33:41.000 GNU was written for your freedom. 0:33:41.100,0:33:44.800 Because without a free operating system 0:33:44.900,0:33:49.300 it’s impossible to have[br]freedom and use a computer. 0:33:49.900,0:33:54.000 And there were none, and[br]I wanted people to have freedom 0:33:54.100,0:33:57.000 so it was up to me to write one. 0:33:57.100,0:34:00.900 Nowadays there are millions of users[br]of the GNU operating system 0:34:01.000,0:34:05.800 and most of them don’t know[br]they are using the GNU operating system 0:34:05.900,0:34:10.000 because there is a widespread[br]practice which is not nice. 0:34:10.100,0:34:13.600 People call the system “Linux”. 0:34:13.700,0:34:18.800 Many do, but some people don’t[br]and I hope you’ll be one of them. 0:34:18.900,0:34:22.400 Please, since we started this 0:34:22.500,0:34:25.300 since we wrote the biggest piece of the code 0:34:25.400,0:34:28.000 please give us equal mention 0:34:28.100,0:34:36.800 please call the system GNU+Linux[br]or GNU/Linux. It’s not much to ask! 0:34:37.300,0:34:40.000 But there is another reason to do this. 0:34:40.100,0:34:44.600 It turns out that the person who wrote Linux 0:34:44.700,0:34:48.700 which is one component of the[br]system as we use it today 0:34:48.900,0:34:52.000 he doesn’t agree with[br]the free software movement. 0:34:52.900,0:34:56.800 And so if you call the whole system Linux 0:34:56.900,0:35:03.500 in effect you’re steering people towards[br]his ideas and away from our ideas. 0:35:03.600,0:35:07.800 Because he’s not gonna say to them[br]that they deserve freedom. 0:35:07.900,0:35:15.000 He’s going to say to them that he likes[br]convenient, reliable, powerful software. 0:35:15.100,0:35:19.000 He’s going to tell people that[br]those are the important values. 0:35:19.100,0:35:26.700 But if you tell them the system is GNU+Linux,[br]the GNU operating system plus Linux the kernel 0:35:26.800,0:35:32.300 then they’ll know about us[br]and then they might listen to what we say. 0:35:33.000,0:35:41.800 You deserve freedom, and since freedom[br]will be lost if we don’t defend it — 0:35:41.900,0:35:46.200 there’s always going to be[br]a Sarkozy to take it away — 0:35:47.900,0:35:52.800 we need above all to teach[br]people to demand freedom 0:35:52.900,0:35:56.000 to be ready to stand up for their freedom 0:35:56.800,0:36:03.000 the next time someone threatens to take it away. 0:36:10.000,0:36:15.900 Nowadays, you can tell who doesn't want[br]to discuss these ideas of freedom 0:36:16.000,0:36:19.000 because they don’t say “logiciel libre”. 0:36:19.100,0:36:22.900 They don’t say “libre”,[br]they say “open source”. 0:36:23.000,0:36:26.900 That term was coined by[br]the people like Mr Torvalds 0:36:27.000,0:36:31.800 who would prefer that these[br]ethical issues don’t get raised. 0:36:31.900,0:36:36.900 And so the way you can help us[br]raise them is by saying libre. 0:36:37.000,0:36:41.800 You know, it’s up to you where you stand[br]you’re free to say what you think. 0:36:41.900,0:36:45.000 If you agree with them,[br]you can say open source. 0:36:45.000,0:36:49.000 If you agree with us, show it: say libre! 0:36:51.900,0:36:55.900 Now the most important[br]point about free software 0:36:56.000,0:37:02.000 is that schools must teach[br]exclusively free software. 0:37:02.100,0:37:05.900 All levels of schools from[br]kindergarten to university 0:37:06.000,0:37:13.900 it’s their moral responsibility to teach[br]only free software in their education 0:37:14.000,0:37:17.000 and all other educational activities as well 0:37:17.100,0:37:23.000 including those that say that[br]they’re spreading digital literacy. 0:37:23.100,0:37:30.000 A lot of those activities teach Windows,[br]which means they’re teaching dependence. 0:37:30.100,0:37:35.000 To teach people the use of proprietary[br]software is to teach dependence 0:37:36.000,0:37:43.000 and educational activities must never do that[br]because it’s the opposite of their mission. 0:37:43.600,0:37:49.500 Educational activities have[br]a social mission to educate good citizens 0:37:49.600,0:37:57.500 of a strong, capable, cooperating,[br]independent and free society. 0:37:57.900,0:38:03.300 And in the area of computing,[br]that means: teach free software. 0:38:04.000,0:38:11.000 Never teach a proprietary program[br]because that’s inculcating dependence. 0:38:11.200,0:38:17.900 Why do you think some proprietary developers[br]offer gratis copies to schools? 0:38:18.000,0:38:23.000 They want the schools[br]to make the children dependent. 0:38:23.200,0:38:28.000 And then, when they graduate,[br]they’re still dependent 0:38:28.100,0:38:32.500 and you know the company is not going[br]to offer them gratis copies. 0:38:33.000,0:38:37.900 And some of them get jobs[br]and go to work for companies. 0:38:38.000,0:38:42.000 Not many of them anymore,[br]but some of them. 0:38:42.100,0:38:46.800 And those companies are not going[br]to be offered gratis copies. 0:38:46.900,0:38:50.800 Oh no! The idea is if the school[br]directs the students 0:38:50.900,0:38:53.500 down the path of permanent dependence 0:38:53.600,0:38:57.900 they can drag the rest of society[br]with them into dependence. 0:38:58.000,0:39:03.500 That’s the plan! It’s just like[br]giving the school gratis needles 0:39:03.600,0:39:06.900 full of addicting drugs, saying 0:39:07.000,0:39:11.100 “inject this into your students,[br]the first dose is gratis.” 0:39:11.900,0:39:15.000 Once you’re dependent,[br]then you have to pay. 0:39:15.100,0:39:18.000 Well, the school would reject the drugs 0:39:18.000,0:39:21.800 because it isn’t right to teach[br]the students to use addictive drugs 0:39:21.900,0:39:26.900 and it’s got to reject[br]the proprietary software also. 0:39:27.000,0:39:34.000 Some people say “let’s have the school teach[br]both proprietary software and free software” 0:39:34.400,0:39:37.800 “so the students become familiar with both.” 0:39:37.900,0:39:44.400 That’s like saying “for lunch[br]lets give the kids spinach and tobacco” 0:39:44.500,0:39:47.800 “so that they become accustomed to both.” 0:39:47.900,0:39:54.400 No! The schools are only supposed[br]to teach good habits, not bad ones! 0:39:55.000,0:39:59.700 So there should be no Windows in a school 0:39:59.800,0:40:05.400 no Macintosh, nothing[br]proprietary in the education. 0:40:05.800,0:40:10.000 But also, for the sake[br]of educating good programmers. 0:40:10.100,0:40:14.800 You see, some people have[br]a talent for programming. 0:40:14.900,0:40:19.800 At ten to thirteen years old,[br]typically, they’re fascinated 0:40:19.900,0:40:24.000 and if they use a program, they want[br]to know “how does it do this?” 0:40:24.100,0:40:28.800 But when they ask the teacher,[br]if it’s proprietary, the teacher has to say 0:40:28.900,0:40:31.800 “I’m sorry, it’s a secret, we can’t find out.” 0:40:31.900,0:40:35.100 Which means education is forbidden. 0:40:35.500,0:40:40.400 A proprietary program is[br]the enemy of the spirit of education. 0:40:40.500,0:40:45.900 It’s knowledge withheld, so[br]it should not be tolerated in a school 0:40:46.000,0:40:49.600 even though there may be[br]plenty of people in the school 0:40:49.700,0:40:53.300 who don’t care about programming,[br]don’t want to learn this. 0:40:53.400,0:40:57.800 Still, because it’s the enemy[br]of the spirit of education 0:40:57.900,0:41:00.800 it shouldn’t be there in the school. 0:41:00.900,0:41:04.800 But if the program is free,[br]the teacher can explain what he knows 0:41:04.900,0:41:07.800 and then give out copies[br]of the source code, saying: 0:41:07.900,0:41:10.600 “read it and you’ll understand everything.” 0:41:10.700,0:41:13.800 And those who are really[br]fascinated, they will read it! 0:41:13.900,0:41:19.700 And this gives them an opportunity[br]to start to learn how to be good programmers. 0:41:19.800,0:41:24.000 To learn to be a good programmer,[br]you’ll need to recognize 0:41:24.100,0:41:30.300 that certain ways of writing code, even if[br]they make sense to you and they are correct 0:41:30.400,0:41:35.000 they’re not good because other people[br]will have trouble understanding them. 0:41:35.100,0:41:40.000 Good code is clear code that others[br]will have an easy time working on 0:41:40.100,0:41:43.000 when they need to make further changes. 0:41:43.100,0:41:46.000 How do you learn to write good clear code? 0:41:46.100,0:41:49.700 You do it by reading lots of code,[br]and writing lots of code. 0:41:49.800,0:41:53.000 And only free software offers the chance 0:41:53.100,0:41:58.500 to read the code of large[br]programs that we really use. 0:41:58.600,0:42:02.600 And then you have to write lots of code 0:42:02.700,0:42:06.000 which means you have[br]to write changes in large programs. 0:42:06.000,0:42:09.900 How do you learn to write[br]good code for large programs? 0:42:10.000,0:42:15.800 You have to start small, which[br]does not mean small programs, oh no! 0:42:15.900,0:42:22.800 The challenges of the code for large programs[br]don’t even begin to appear in small programs. 0:42:22.900,0:42:26.800 So the way you start small at[br]writing code for large programs 0:42:26.900,0:42:31.300 is by writing small[br]changes in large programs. 0:42:31.600,0:42:35.000 And only free software[br]gives you the chance to do that! 0:42:35.100,0:42:43.800 So, if a school wants to offer the possibility[br]of learning to be a good programmer 0:42:43.900,0:42:46.800 it needs to be a free software school. 0:42:46.900,0:42:49.100 But there is an even deeper reason 0:42:49.200,0:42:52.800 and that is for the sake of moral education 0:42:52.900,0:42:55.700 education in citizenship. 0:42:55.800,0:42:59.800 It’s not enough for a school[br]to teach facts and skills 0:42:59.900,0:43:07.000 it has to teach the spirit of goodwill,[br]the habit of helping others. 0:43:07.100,0:43:10.000 Therefore, every class should have this rule: 0:43:10.100,0:43:15.000 “Students, if you bring software to class,[br]you may not keep it for yourself” 0:43:15.100,0:43:18.900 ”you must share copies[br]with the rest of the class” 0:43:19.000,0:43:24.400 ”including the source code[br]in case anyone here wants to learn!” 0:43:24.600,0:43:28.000 ”Because this class is a place[br]where we share our knowledge.” 0:43:28.100,0:43:34.500 ”Therefore, bringing a proprietary program[br]to class is not permitted.” 0:43:34.900,0:43:39.800 The school must follow[br]its own rule to set a good example. 0:43:39.900,0:43:43.700 Therefore, the school must bring[br]only free software to class 0:43:43.800,0:43:49.600 and share copies, including the source code[br]with anyone in the class that wants copies. 0:43:50.400,0:43:53.800 Those of you who have[br]a connection with a school 0:43:53.900,0:44:01.400 it’s your duty to campaign and pressure[br]that school to move to free software. 0:44:01.900,0:44:04.000 And you have to be firm. 0:44:04.100,0:44:10.700 It may take years, but you can succeed[br]as long as you never give up. 0:44:10.800,0:44:18.000 Keep seeking more allies among the students,[br]the faculty, the staff, the parents, anyone! 0:44:18.600,0:44:22.900 And always bring it up as an ethical issue. 0:44:23.000,0:44:26.000 If someone else wants[br]to sidetrack the discussion 0:44:26.100,0:44:30.800 into this practical advantage[br]and this practical disadvantage 0:44:30.900,0:44:35.900 which means they’re ignoring the most[br]important question, then you have to say: 0:44:36.000,0:44:41.800 “this is not about how to do[br]the best job of educating“ 0:44:41.900,0:44:48.000 “this is about how to do a good[br]education instead of an evil one.“ 0:44:48.200,0:44:53.800 “It’s how to do education right[br]instead of wrong“ 0:44:53.900,0:44:58.800 “not just how to make it[br]a little more effective or less.” 0:44:59.000,0:45:06.000 So don’t get distracted with those secondary[br]issues and ignore what really matters! 0:45:07.000,0:45:12.000 So, moving on to the next menace. 0:45:12.500,0:45:20.600 There are two issues that arise[br]from the use of internet services. 0:45:20.700,0:45:26.900 One of them is that the server[br]could abuse your data 0:45:27.000,0:45:31.800 and another is that[br]it could take control of your computing. 0:45:31.900,0:45:35.800 The first issue, people already know about. 0:45:35.900,0:45:41.800 They are aware that, if you[br]upload data to an internet service 0:45:41.900,0:45:44.900 there is a question of what[br]it will do with that data. 0:45:45.000,0:45:48.000 It might do things that mistreat you. 0:45:48.100,0:45:53.800 What could it do? It could lose the data,[br]it could change the data 0:45:53.900,0:45:57.900 it could refuse to let you get the data back. 0:45:58.000,0:46:04.000 And it could also show the data to[br]someone else you don’t want to show it to. 0:46:04.200,0:46:07.000 Four different possible things. 0:46:07.100,0:46:13.000 Now, here, I’m talking about the data[br]that you knowingly gave to that site. 0:46:13.100,0:46:19.000 Of course, many of those[br]services do surveillance as well. 0:46:19.300,0:46:22.000 For instance, consider Facebook. 0:46:22.100,0:46:28.000 Users send lots of data to Facebook,[br]and one of the bad things about Facebook 0:46:28.100,0:46:33.000 is that it shows a lot of[br]that data to lots of other people 0:46:33.100,0:46:40.800 and even if it offers them a setting[br]to say “no!”, that may not really work. 0:46:40.900,0:46:45.900 After all, if you say “some other people[br]can see this piece of information,” 0:46:46.000,0:46:48.400 one of them might publish it. 0:46:48.500,0:46:50.400 Now, that’s not Facebook’s fault 0:46:50.500,0:46:54.200 there is nothing they could do to[br]prevent that but it ought to warn people. 0:46:54.300,0:46:59.800 Instead of saying “mark this as only[br]to your so-called friends” 0:46:59.900,0:47:05.900 “it should say “keep in mind that your[br]so-called friends are not really your friends” 0:47:06.000,0:47:10.800 “and if they want to make trouble[br]for you, they could publish this.” 0:47:10.900,0:47:17.000 Every time, it should say that, if[br]they want to deal with people ethically. 0:47:21.500,0:47:26.000 As well as all the data users of Facebook[br]voluntarily give to Facebook 0:47:26.000,0:47:32.700 Facebook is collecting through data[br]about people’s activities on the net 0:47:32.800,0:47:38.600 through various methods of surveillance.[br]But that was the first menace. 0:47:38.700,0:47:45.000 For now I am talking about the data[br]that people know they are giving to these sites. 0:47:47.000,0:47:54.200 Losing data is something that[br]could always happen by accident. 0:47:54.400,0:47:59.000 That possibility is always there,[br]no matter how careful someone is. 0:47:59.100,0:48:04.000 Therefore, you need to keep[br]multiple copies of data that matters. 0:48:04.100,0:48:12.000 If you do that, then, even if someone[br]decided to delete your data intentionally 0:48:12.100,0:48:16.000 it wouldn’t hurt you that much,[br]because you’d have other copies of it. 0:48:16.100,0:48:19.800 So, as long as you are[br]maintaining multiple copies 0:48:19.900,0:48:25.000 you don’t have to worry too much[br]about someone’s losing your data. 0:48:25.600,0:48:29.600 What about whether you can get it back. 0:48:29.700,0:48:35.700 Well, some services make it possible to get[br]back all the data that you sent, and some don’t. 0:48:35.800,0:48:41.800 Google services will let the user[br]get back the data the user has put into them. 0:48:41.900,0:48:45.200 Facebook, famously, does not. 0:48:45.600,0:48:51.900 Of course in the case of Google, this only[br]applies to the data the user knows Google has. 0:48:52.000,0:48:57.000 Google does lots of surveillance, too[br]and that data is not included. 0:48:58.800,0:49:02.600 But in any case, if you[br]can get the data back 0:49:02.700,0:49:07.500 then you could track[br]whether they have altered it. 0:49:07.600,0:49:13.000 And they are not very likely to start[br]altering people’s data if the people can tell. 0:49:13.100,0:49:18.900 So maybe we can keep a track[br]on that particular kind of abuse. 0:49:19.000,0:49:24.400 But the abuse of showing the data to someone[br]you don’t want it to be shown to 0:49:24.500,0:49:29.000 is very common and almost[br]impossible for you to prevent 0:49:29.600,0:49:33.100 especially if it’s a US company. 0:49:33.300,0:49:40.000 You see, the most hypocritically[br]named law in US history 0:49:40.100,0:49:49.900 the so-called USA Patriot Act,[br]says that Big Brother’s police 0:49:50.000,0:49:56.000 can collect just about all the data[br]that companies maintain about individuals. 0:49:56.100,0:50:01.700 Not just companies, but other[br]organizations too, like public libraries. 0:50:01.800,0:50:07.700 The police can get this massively,[br]without even going to court. 0:50:07.900,0:50:13.000 Now, in a country that was[br]founded on an idea of freedom 0:50:13.100,0:50:19.000 there is nothing more unpatriotic[br]than this. But this is what they did. 0:50:19.100,0:50:24.800 So you mustn’t ever trust any[br]of your data to a US company. 0:50:24.900,0:50:32.000 And they say that foreign subsidiaries[br]of US companies are subject to this as well 0:50:32.100,0:50:36.000 so the company you are directly[br]dealing with may be in Europe 0:50:36.000,0:50:43.000 but if it’s owned by a US company,[br]you got the same problem to deal with. 0:50:48.800,0:50:52.800 However, this is mainly a concern 0:50:52.900,0:50:59.700 when the data you are sending[br]to the service is not for publication. 0:50:59.700,0:51:03.000 There are some services[br]where you publish things. 0:51:03.100,0:51:07.800 Of course, if you publish something,[br]you know everybody is gonna be able to see it. 0:51:07.900,0:51:10.300 So, there is no way they can hurt you 0:51:10.400,0:51:13.100 by showing it to somebody[br]who wasn’t supposed to see it. 0:51:13.200,0:51:17.700 There is nobody who wasn’t supposed[br]to see it if you published it. 0:51:17.800,0:51:22.000 So in that case the problem doesn’t exist. 0:51:23.500,0:51:32.000 So these are four sub-issues[br]of this one threat of abusing our data. 0:51:32.100,0:51:38.800 The idea of the Freedom Box project is[br]you have your own server in your own home 0:51:38.900,0:51:43.000 and when you want to do something remotely[br]you do it with your own server 0:51:43.100,0:51:48.800 and the police have to get a court order[br]in order to search your server. 0:51:48.900,0:51:56.000 So you have the same rights this way that you[br]would have traditionally in the physical world. 0:51:56.300,0:52:02.000 The point here and in[br]so many other issues is: 0:52:02.100,0:52:06.400 as we start doing things[br]digitally instead of physically 0:52:06.500,0:52:15.000 we shouldn’t lose any of our rights, because[br]the general tendency is that we do lose rights. 0:52:18.200,0:52:25.000 Basically, Stallman’s law says 0:52:25.100,0:52:31.700 that in an epoch when governments[br]work for the mega-corporations 0:52:31.800,0:52:36.000 instead of reporting to their citizens 0:52:36.100,0:52:45.000 every technological change can be taken[br]advantage of to reduce our freedom. 0:52:47.000,0:52:51.200 Because reducing our freedom is what[br]these governments want to do. 0:52:52.000,0:52:55.000 So the question is: when[br]do they get an opportunity? 0:52:55.100,0:53:01.600 Well, any change that happens for some[br]other reason is a possible opportunity 0:53:01.700,0:53:07.000 and they will take advantage of it[br]if that’s their general desire. 0:53:09.500,0:53:12.400 But the other issue[br]with internet services 0:53:12.500,0:53:16.000 is that they can take[br]control of your computing 0:53:16.100,0:53:22.000 and that’s not so commonly known.[br]But It’s becoming more common. 0:53:22.100,0:53:29.700 There are services that offer to do[br]computing for you on data supplied by you 0:53:30.000,0:53:34.800 things that you should do[br]in your own computer 0:53:34.900,0:53:41.000 but they invite you to let somebody else’s[br]computer do that computing work for you. 0:53:41.300,0:53:49.200 And the result is you lose control over it.[br]It’s just as if you used a non-free program. 0:53:49.700,0:53:55.800 Two different scenarios[br]but they lead to the same problem. 0:53:55.900,0:54:01.000 If you do your computing[br]with a non-free program 0:54:01.100,0:54:05.000 well, the users don’t control[br]the non-free program 0:54:05.100,0:54:08.000 it controls the users,[br]which would include you. 0:54:08.100,0:54:12.000 So you’ve lost control of[br]the computing that’s being done. 0:54:12.100,0:54:17.000 But if you do your computing in his server 0:54:17.100,0:54:22.800 well, the programs that are doing it[br]are the ones he chose. 0:54:22.900,0:54:27.800 You can’t touch them or see them,[br]so you have no control over them. 0:54:27.900,0:54:31.000 He has control over them, maybe. 0:54:31.100,0:54:36.000 If they are free software and he installs[br]them then he has control over them. 0:54:36.100,0:54:38.800 But even he might not have control. 0:54:38.900,0:54:42.200 He might be running a proprietary[br]program in his server 0:54:42.300,0:54:49.400 in which case it’s somebody else who has control[br]of the computing being done in his server. 0:54:49.500,0:54:52.000 He doesn’t control it and you don’t. 0:54:52.300,0:54:55.500 But suppose he installs a free program 0:54:55.600,0:55:02.000 then he has control over the computing[br]being done in his computer, but you don’t. 0:55:02.100,0:55:05.000 So, either way, you don’t! 0:55:05.100,0:55:08.000 So the only way to have[br]control over your computing 0:55:08.100,0:55:14.800 is to do it with[br]your copy of a free program. 0:55:15.800,0:55:20.000 This practice is called[br]“Software as a Service”. 0:55:20.400,0:55:28.200 It means doing your computing with[br]your data in somebody else’s server. 0:55:28.300,0:55:32.200 And I don’t know of anything[br]that can make this acceptable. 0:55:32.300,0:55:37.000 It’s always something[br]that takes away your freedom 0:55:37.100,0:55:41.400 and the only solution[br]I know of is to refuse. 0:55:41.800,0:55:47.800 For instance, there are servers that[br]will do translation or voice recognition 0:55:47.900,0:55:53.800 and you are letting them have[br]control over this computing activity 0:55:53.900,0:55:56.000 which we shouldn’t ever do. 0:55:56.100,0:55:59.000 Of course, we are also[br]giving them data about ourselves 0:55:59.100,0:56:02.000 which they shouldn’t have. 0:56:02.100,0:56:06.400 Imagine if you had[br]a conversation with somebody 0:56:06.500,0:56:13.100 through a voice-recognition translation[br]system that was Software as as Service 0:56:13.200,0:56:18.000 and it’s really running[br]on a server belonging to some company. 0:56:18.100,0:56:24.000 That company also gets to know what[br]was said in the conversation 0:56:24.100,0:56:32.000 and if it’s a US company that means[br]Big Brother also gets to know. This is no good. 0:56:35.700,0:56:44.000 The next threat to our freedom in a digital[br]society is using computers for voting. 0:56:46.000,0:56:50.700 You can’t trust computers for voting. 0:56:50.800,0:56:54.000 Whoever controls the software[br]in those computers 0:56:54.100,0:57:00.000 has the power to commit[br]undetectable fraud. 0:57:02.000,0:57:10.700 Elections are special. Because there’s[br]nobody involved that we dare trust fully. 0:57:10.900,0:57:15.000 Everybody has to be checked,[br]crosschecked by others 0:57:15.100,0:57:21.700 so that nobody is in the position[br]to falsify the results by himself. 0:57:21.800,0:57:26.300 Because if anybody is in a position[br]to do that he might do it! 0:57:26.400,0:57:31.000 So our traditional systems[br]for voting were designed 0:57:31.100,0:57:37.200 so that nobody was fully trusted,[br]everybody was being checked by others. 0:57:37.300,0:57:42.000 So that nobody could easily commit fraud. 0:57:42.000,0:57:48.300 But once you introduce a program,[br]this is impossible! 0:57:48.400,0:57:53.700 How can you tell if a voting machine[br]would honestly count the votes? 0:57:53.800,0:57:59.000 You’d have to study the program that’s[br]running in it during the election 0:57:59.200,0:58:05.800 which of course nobody can do, and most[br]people wouldn’t even know how to do. 0:58:05.900,0:58:10.800 But even the experts who might theoretically[br]be capable of studying the program 0:58:10.900,0:58:15.400 they can’t do it while people are voting. 0:58:15.500,0:58:18.000 They’d have to do it in advance 0:58:18.100,0:58:21.700 and then how do they know[br]that the program they studied 0:58:21.800,0:58:26.900 is the one that’s running while[br]people vote? Maybe it’s been changed. 0:58:27.000,0:58:34.000 Now, if this program is proprietary,[br]that means some company controls it. 0:58:34.100,0:58:38.000 The election authority can’t even[br]tell what that program is doing. 0:58:38.100,0:58:41.700 Well, this company then[br]could rig the election. 0:58:41.800,0:58:47.000 There are accusations that this was done[br]in the US within the past ten years 0:58:47.100,0:58:51.000 that election results were falsified this way. 0:58:51.100,0:58:54.000 But what if the program is free software? 0:58:54.100,0:58:57.000 That means the election authority 0:58:57.100,0:59:01.400 who owns this voting machine[br]has control over the software in it 0:59:01.500,0:59:04.000 so the election authority[br]could rig the election. 0:59:04.100,0:59:07.000 You can’t trust them either. 0:59:07.000,0:59:11.000 You don’t dare trust anybody in voting 0:59:11.100,0:59:17.000 and the reason is, there’s no way[br]that the voters can verify for themselves 0:59:17.100,0:59:24.700 that their votes were correctly counted,[br]nor that false votes were not added. 0:59:25.000,0:59:33.000 In other activities of life, you can usually[br]tell if somebody is trying to cheat you. 0:59:33.100,0:59:36.800 Consider for instance buying[br]something from a store. 0:59:36.900,0:59:40.000 You order something, maybe[br]you give a credit card number. 0:59:40.100,0:59:46.000 If the product doesn’t come,[br]you can complain 0:59:46.100,0:59:48.400 and you can, of course if you got[br]a good enough memory, 0:59:48.500,0:59:51.200 you will notice if that product doesn’t come. 0:59:51.700,0:59:59.000 You’re not just giving total blind trust[br]to the store, because you can check. 0:59:59.100,1:00:02.200 But in elections you can’t check. 1:00:02.900,1:00:06.000 I saw once a paper where someone described 1:00:06.100,1:00:10.200 a theoretical system for voting 1:00:10.800,1:00:15.200 which uses some sophisticated mathematics 1:00:15.300,1:00:20.000 so that people could check[br]that their votes had been counted 1:00:20.100,1:00:23.000 even though everybody’s vote was secret 1:00:23.100,1:00:27.000 and they could also verify[br]that false votes hadn’t been added. 1:00:27.100,1:00:30.800 It was very exciting, powerful mathematics; 1:00:30.900,1:00:34.000 but even if that mathematics is correct 1:00:34.100,1:00:38.000 that doesn’t mean the system[br]would be acceptable to use in practice 1:00:38.100,1:00:45.700 because the vulnerabilities of a real[br]system might be outside of that mathematics. 1:00:45.900,1:00:50.300 For instance, suppose you’re[br]voting over the Internet 1:00:50.400,1:00:54.200 and suppose you’re using[br]a machine that’s a zombie. 1:00:54.800,1:00:59.000 It might tell you that[br]the vote was sent for A 1:00:59.100,1:01:05.000 while actually sending a vote for B.[br]Who knows whether you’d ever find out? 1:01:05.100,1:01:11.800 In practice, the only way to see[br]if these systems work and are honest 1:01:11.900,1:01:23.000 is through years, in fact decades, of trying[br]them and checking in other ways what happened. 1:01:26.400,1:01:33.000 I wouldn’t want my country[br]to be the pioneer in this. 1:01:34.000,1:01:43.000 So, use paper for voting. Make sure[br]there are ballots that can be recounted. 1:01:46.000,1:01:54.500 The next threat to our freedom in a digital[br]society comes from the war on sharing. 1:01:55.000,1:01:59.500 One of the tremendous benefits[br]of digital technology 1:01:59.800,1:02:08.000 is that it is easy to copy published works[br]and share these copies with others. 1:02:09.000,1:02:15.300 Sharing is good, and with[br]digital technology, sharing is easy. 1:02:15.500,1:02:18.700 So, millions of people share. 1:02:18.800,1:02:23.000 Those who profit by having power 1:02:23.100,1:02:28.000 over the distribution of these[br]works don’t want us to share. 1:02:28.800,1:02:35.000 And since they are businesses,[br]governments which have betrayed their people 1:02:35.100,1:02:40.800 and work for the empire of mega-corporations[br]try to serve those businesses 1:02:40.900,1:02:46.000 they are against their own people, they are[br]for the businesses, for the publishers. 1:02:46.200,1:02:52.800 Well, that’s not good.[br]And with the help of these governments 1:02:52.900,1:02:58.000 the companies have been waging war on sharing 1:02:58.100,1:03:05.700 and they’ve proposed a series[br]of cruel draconian measures. 1:03:05.800,1:03:08.800 Why do they propose cruel draconian measures? 1:03:08.900,1:03:13.800 Because nothing less has a chance of success: 1:03:13.900,1:03:19.000 when something is good[br]and easy, people do it. 1:03:20.000,1:03:24.800 And the only way to stop them[br]is by being very nasty. 1:03:24.900,1:03:31.000 So of course, what they propose is nasty,[br]nasty, and the next one is nastier. 1:03:33.000,1:03:41.000 So they tried suing teenagers for hundreds[br]of thousands of dollars — that was pretty nasty. 1:03:41.600,1:03:46.000 And they tried turning[br]our technology against us 1:03:46.100,1:03:51.900 Digital Restrictions Management[br]that means, digital handcuffs. 1:03:52.000,1:03:57.600 But among the people[br]there were clever programmers too 1:03:57.700,1:04:01.000 and they found ways to break the handcuffs. 1:04:01.100,1:04:08.600 For instance, DVDs were designed to have[br]encrypted movies in a secret encryption format 1:04:08.700,1:04:14.600 and the idea was that all[br]the programs to decrypt the video 1:04:14.700,1:04:18.700 would be proprietary with digital handcuffs. 1:04:18.800,1:04:22.000 They would all be designed[br]to restrict the users. 1:04:22.100,1:04:25.000 And their scheme worked okay for a while. 1:04:25.100,1:04:29.000 But some people in Europe[br]figured out the encryption 1:04:29.100,1:04:37.000 and they released a free program that[br]could actually play the video on a DVD. 1:04:40.300,1:04:44.000 Well, the movie companies[br]didn’t leave it there. 1:04:44.100,1:04:51.700 They went to the US congress and bought[br]a law making that software illegal. 1:04:51.800,1:04:58.600 The United States invented[br]censorship of software in 1998 1:04:58.700,1:05:02.000 with the Digital Millennium[br]Copyright Act [DMCA]. 1:05:02.100,1:05:08.000 So the distribution of that free program[br]was forbidden in the United States. 1:05:08.100,1:05:11.800 Unfortunately it didn’t stop[br]with the United States. 1:05:11.900,1:05:21.000 The European Union adopted a directive[br]in 2003 I believe, requiring such laws. 1:05:21.300,1:05:27.900 The directive only says that[br]commercial distribution has to be banned 1:05:28.000,1:05:34.000 but just about every country in[br]the European Union has adopted a nastier law. 1:05:34.700,1:05:40.400 In France, the mere possession[br]of a copy of that program 1:05:40.500,1:05:46.000 is an offense punished by[br]imprisonment, thanks to Sarkozy. 1:05:47.900,1:05:52.400 I believe that was done by the law DADVSI. 1:05:53.000,1:05:56.300 I guess he hoped that with[br]an unpronounceable name 1:05:56.400,1:06:00.000 people wouldn’t be able to criticize it. 1:06:02.000,1:06:08.000 So, elections are coming.[br]Ask the candidates in the parties: 1:06:08.100,1:06:14.400 will you repeal the DADVSI?[br]And if not, don’t support them. 1:06:14.800,1:06:22.400 You mustn’t give up lost[br]moral territory forever. 1:06:22.500,1:06:26.000 You’ve got to fight to win it back. 1:06:26.100,1:06:31.600 So, we still are fighting[br]against digital handcuffs. 1:06:31.800,1:06:36.000 The Amazon “Swindle” has digital handcuffs 1:06:36.100,1:06:41.300 to take away the traditional freedoms[br]of readers to do things such as: 1:06:41.400,1:06:46.000 give a book to someone else,[br]or lend a book to someone else. 1:06:46.100,1:06:49.000 That’s a vitally important social act. 1:06:49.100,1:06:55.400 That is what builds society[br]among people who read: lending books. 1:06:55.500,1:06:59.000 Amazon doesn’t want to let[br]people lend books freely. 1:06:59.100,1:07:08.000 And then there is also selling a book, perhaps[br]to a used bookstore. You can’t do that either. 1:07:12.000,1:07:18.000 It looked for a while as if[br]DRM had disappeared on music 1:07:18.100,1:07:25.900 but now they’re bringing it back[br]with streaming services such as Spotify. 1:07:26.000,1:07:31.000 These services all require[br]proprietary client software 1:07:31.100,1:07:37.000 and the reason is so they can put[br]digital handcuffs on the users. 1:07:37.700,1:07:44.600 So, reject them! They already[br]showed quite openly 1:07:44.700,1:07:48.000 that you can’t trust them,[br]because first they said: 1:07:48.100,1:07:51.000 “you can listen as much as you like”,[br]and then they said: 1:07:51.100,1:07:55.000 “Oh, no! You can only listen[br]a certain number of hours a month.” 1:07:57.900,1:08:06.800 The issue is not whether that particular[br]change was good or bad, just or unjust; 1:08:06.900,1:08:11.300 the point is, they have the power[br]to impose any change in policies. 1:08:11.400,1:08:14.500 So don’t let them have that power. 1:08:14.600,1:08:21.000 You should have your own copy[br]of any music you want to listen to. 1:08:22.100,1:08:34.500 And then came the next assault on our freedom:[br]HADOPI, basically punishment on accusation. 1:08:34.600,1:08:41.400 It was started in France but it’s been[br]exported to many other countries. 1:08:41.800,1:08:50.000 The United States now demand such unjust[br]policies in its free exploitation treaties. 1:08:50.100,1:09:00.000 A few months ago, Columbia adopted such a law[br]under orders from its masters in Washington. 1:09:01.000,1:09:05.000 Of course, the ones in Washington[br]are not the real masters 1:09:05.100,1:09:10.500 they’re just the ones who control the[br]United States on behalf of the Empire. 1:09:11.000,1:09:19.000 But they’re the ones who also dictate[br]to Columbia on behalf of the Empire. 1:09:21.900,1:09:27.800 In France, since the[br]Constitutional Council 1:09:27.900,1:09:33.000 objected to explicitly giving[br]people punishment without trial 1:09:33.100,1:09:36.800 they invented a kind of trial[br]which is not a real trial 1:09:36.900,1:09:39.000 which is just a form of a trial 1:09:39.100,1:09:44.300 so they can pretend that people[br]have a trial before they’re punished. 1:09:44.400,1:09:47.000 But in other countries[br]they don’t bother with that 1:09:47.100,1:09:52.000 it’s explicit punishment on accusation only. 1:09:53.000,1:09:57.000 Which means that for the sake[br]of their war on sharing 1:09:57.100,1:10:01.400 they’re prepared to abolish[br]the basic principles of justice. 1:10:01.500,1:10:08.700 It shows how thoroughly[br]anti-freedom, anti-justice they are. 1:10:08.800,1:10:12.000 These are not legitimate governments. 1:10:15.500,1:10:19.000 And I’m sure they’ll[br]come up with more nasty ideas 1:10:19.100,1:10:27.000 because they’re paid to defeat[br]the people no matter what it takes. 1:10:28.700,1:10:36.000 Now, when they do this, they always say[br]that it’s for the sake of the artists 1:10:36.100,1:10:42.000 that they have “protect” the “creators”. 1:10:42.100,1:10:45.000 Now those are both propaganda terms. 1:10:45.100,1:10:48.200 I‘m convinced that the reason[br]they love the word “creators“ 1:10:48.300,1:10:53.400 is because it is a comparison with a deity. 1:10:53.500,1:10:57.000 They want us to think of artists as super-human 1:10:57.100,1:11:03.000 and thus deserving special[br]privileges and power over us 1:11:03.600,1:11:06.800 which is something I disagree with. 1:11:06.900,1:11:15.000 In fact though, the only artists that benefit[br]very much from this system are the big stars. 1:11:15.300,1:11:20.300 The other artists are getting[br]crushed into the ground 1:11:20.400,1:11:24.400 by the heels of these same companies. 1:11:25.600,1:11:30.300 But they treat the stars very well,[br]because the stars have a lot of clout. 1:11:30.400,1:11:34.000 If a star threatens to move to[br]another company, the company says: 1:11:34.100,1:11:36.500 “oh, we’ll give you what you want.” 1:11:36.600,1:11:44.000 But for any other artist they say: “you don’t[br]matter, we can treat you any way we like.” 1:11:46.600,1:11:54.200 So the superstars have been corrupted by the[br]millions of dollars or euros that they get 1:11:54.300,1:12:01.300 to the point where they’ll do[br]almost anything for more money. 1:12:01.900,1:12:06.200 For instance, J. K. Rowling is a good example. 1:12:07.800,1:12:12.800 J. K. Rowling, a few years ago,[br]went to court in Canada 1:12:12.900,1:12:21.200 and obtained an order that people who[br]had bought her books must not read them. 1:12:21.800,1:12:27.000 She got an order telling[br]people not to read her books. 1:12:27.500,1:12:34.900 Here’s what happened. A bookstore put[br]the books on display for sale too early 1:12:35.000,1:12:38.600 before the day they[br]were supposed to go on sale. 1:12:38.700,1:12:40.700 And people came into the store and said: 1:12:40.800,1:12:44.600 “oh, I want that!” and they bought it[br]and took away their copies. 1:12:44.700,1:12:50.800 Then, they discovered the mistake[br]so they took the copies off of display. 1:12:52.200,1:13:01.700 But Rowling wanted to crush any circulation[br]of any information from those books 1:13:01.800,1:13:04.900 so she went to court, and the court ordered 1:13:05.000,1:13:10.000 those people not to read[br]the books that they now owned. 1:13:11.900,1:13:19.000 In response, I call for a total[br]boycott of Harry Potter. 1:13:20.200,1:13:25.000 But I don’t say you shouldn’t read[br]those books or watch the movies 1:13:25.100,1:13:30.000 I only say you shouldn’t buy[br]the books or pay for the movies. 1:13:30.300,1:13:36.300 I leave it to Rowling to tell[br]people not to read the books. 1:13:37.800,1:13:44.000 As far as I’m concerned, if you borrow[br]the book and read it, that’s okay. 1:13:44.800,1:13:52.900 Just don’t give her any money![br]But this happened with paper books. 1:13:53.000,1:13:57.000 The court could make this order[br]but it couldn’t get the books back 1:13:57.100,1:13:59.900 from the people who had bought them. 1:14:00.000,1:14:06.400 Imagine if they were ebooks. Imagine if[br]they were ebooks on the “Swindle”. 1:14:06.500,1:14:12.000 Amazon could send commands to erase them. 1:14:16.000,1:14:25.400 So, I don’t have much respect for stars[br]who will go to such lengths for more money. 1:14:25.500,1:14:31.300 But most artists aren’t like that, they[br]never got enough money to be corrupted. 1:14:31.800,1:14:39.000 Because the current system of copyright[br]supports most artists very badly. 1:14:39.100,1:14:47.000 And so, when these companies demand[br]to expand the war on sharing 1:14:47.100,1:14:50.000 supposedly for the sake of the artists 1:14:50.100,1:14:54.400 I’m against what they want but I would[br]like to support the artists better. 1:14:54.500,1:15:01.000 I appreciate their work and I realize if we[br]want them to do more work we should support them. 1:15:01.100,1:15:05.000 I have two proposals[br]for how to support artists 1:15:05.100,1:15:09.000 methods that are compatible with sharing. 1:15:09.100,1:15:15.000 That would allow us to end the war[br]on sharing and still support artists. 1:15:15.100,1:15:18.000 One method uses tax money. 1:15:18.100,1:15:24.800 We get a certain amount of public[br]funds to distribute among artists. 1:15:25.700,1:15:32.400 But, how much should each artist get?[br]We have to measure popularity. 1:15:32.500,1:15:38.100 The current system supposedly supports[br]artists based on their popularity. 1:15:38.200,1:15:44.800 So I’m saying let’s keep that, let’s[br]continue on this system based on popularity. 1:15:44.900,1:15:48.000 We can measure the popularity[br]of all the artists 1:15:48.100,1:15:54.100 with some kind of polling or sampling,[br]so that we don’t have to do surveillance. 1:15:54.200,1:15:57.000 We can respect people’s anonymity. 1:15:57.100,1:16:01.000 We get a raw popularity figure for each artist. 1:16:01.100,1:16:05.000 How do we convert that into an amount of money? 1:16:05.100,1:16:12.000 The obvious way is: distribute[br]the money in proportion to popularity. 1:16:12.600,1:16:21.000 So if A is a thousand times as popular as B[br]A will get a thousand times as much money as B. 1:16:21.300,1:16:25.000 That’s not efficient distribution of the money. 1:16:25.100,1:16:28.000 It’s not putting the money to good use. 1:16:28.100,1:16:36.000 It’s easy for a star A to be a thousand times[br]as popular as a fairly successful artist B. 1:16:36.100,1:16:44.000 If we use linear proportion, we’ll give A[br]a thousand times as much money as we give B. 1:16:44.100,1:16:50.000 And that means that, either we have[br]to make A tremendously rich 1:16:50.100,1:16:54.500 or we are not supporting B enough. 1:16:55.000,1:16:59.000 The money we use to make[br]A tremendously rich 1:16:59.100,1:17:06.200 is failing to do an effective job of[br]supporting the arts; so, it’s inefficient. 1:17:06.300,1:17:12.000 Therefore I say: let’s use the cube root.[br]Cube root looks sort of like this. 1:17:12.100,1:17:17.700 The point is: if A is a thousand[br]times as popular as B 1:17:17.800,1:17:22.200 with the cube root A[br]will get ten times as much as B 1:17:22.800,1:17:25.800 not a thousand times as much,[br]just ten times as much. 1:17:25.900,1:17:30.000 The use of the cube root[br]shifts a lot of the money 1:17:30.100,1:17:36.000 from the stars to the artists[br]of moderate popularity. 1:17:36.600,1:17:44.000 And that means, with less money we can adequately[br]support a much larger number of artists. 1:17:44.100,1:17:49.000 There are two reasons why this system[br]would use less money than we pay now. 1:17:49.100,1:17:53.000 First of all because it would be[br]supporting artists but not companies. 1:17:53.100,1:18:01.600 Second because it would shift the money from[br]the stars to the artists of moderate popularity. 1:18:02.000,1:18:09.300 Now, it would remain the case that the more[br]popular you are, the more money you get. 1:18:09.700,1:18:17.000 So the star A would still get more[br]than B, but not astronomically more. 1:18:19.800,1:18:24.000 That’s one method, and because[br]it won’t be so much money 1:18:24.100,1:18:27.100 it doesn’t matter so much[br]how we get the money. 1:18:27.200,1:18:31.000 It could be from a special tax[br]on Internet connectivity 1:18:31.100,1:18:36.000 it could just be some of the general budget[br]that gets allocated to this purpose. 1:18:36.100,1:18:39.900 We won’t care because[br]it won’t be so much money; 1:18:40.000,1:18:43.300 much less than we’re paying now. 1:18:43.900,1:18:47.800 The other method I’ve proposed[br]is voluntary payments. 1:18:47.900,1:18:55.000 Suppose each player had a button[br]you could use to send one euro. 1:18:55.900,1:19:01.000 A lot of people would send it,[br]after all it’s not that much money. 1:19:01.100,1:19:06.400 I think a lot of you might[br]push that button every day 1:19:06.500,1:19:12.300 to give one euro to some artist[br]who had made a work that you liked. 1:19:12.700,1:19:15.000 But nothing would demand this 1:19:15.100,1:19:19.200 you wouldn’t be required or ordered[br]or pressured to send the money; 1:19:19.300,1:19:21.800 you would do it because you felt like it. 1:19:21.900,1:19:25.000 But there are some people[br]who wouldn’t do it 1:19:25.100,1:19:29.000 because they’re poor and they[br]can’t afford to give one euro. 1:19:29.100,1:19:32.000 And it’s good that they won’t give it. 1:19:32.100,1:19:36.000 We don’t have to squeeze money[br]out of poor people to support the artists. 1:19:36.100,1:19:41.000 There are enough non poor people[br]who’ll be happy to do it. 1:19:41.100,1:19:48.000 Why wouldn’t you give one euro to some[br]artists today, if you appreciated their work? 1:19:48.100,1:19:56.400 It’s too inconvenient to give it to them.[br]So my proposal is to remove the inconvenience. 1:19:56.500,1:20:02.000 If the only reason not to give that euro is[br]you would have one euro less 1:20:02.100,1:20:06.000 you would do it fairly often. 1:20:07.800,1:20:13.000 So these are my two proposals[br]for how to support artists 1:20:13.100,1:20:19.000 while encouraging sharing[br]because sharing is good. 1:20:19.100,1:20:25.000 Let’s put an end to the war on sharing,[br]laws like DADVSI and HADOPI. 1:20:25.200,1:20:29.000 It’s not just the methods[br]that they propose that are evil 1:20:29.100,1:20:31.000 their purpose is evil. 1:20:31.100,1:20:36.000 That’s why they propose[br]cruel and draconian measures. 1:20:36.100,1:20:41.000 They’re trying to do something[br]that’s nasty by nature. 1:20:41.100,1:20:45.300 So let’s support artists in other ways. 1:20:45.900,1:20:52.000 The last threat to our freedom[br]in digital society is the fact 1:20:52.100,1:21:01.000 that we don’t have a firm right[br]to do the things we do, in cyberspace. 1:21:02.000,1:21:05.800 In the physical world,[br]if you have certain views 1:21:05.900,1:21:11.400 and you want to give people copies[br]of a text that defends those views 1:21:11.500,1:21:16.000 you’re free to do so. You could[br]even buy a printer to print them 1:21:16.100,1:21:20.900 and you’re free to hand them out on the street 1:21:21.000,1:21:25.000 or you’re free to rent[br]a store and hand them out there. 1:21:25.100,1:21:29.000 If you want to collect[br]money to support your cause 1:21:29.100,1:21:33.800 you can just have a can and people[br]could put money into the can. 1:21:33.900,1:21:42.000 You don’t need to get somebody else’s[br]approval or cooperation to do these things. 1:21:42.100,1:21:47.200 But, in the Internet, you do need that. 1:21:47.300,1:21:51.000 For instance if you want[br]to distribute a text on the Internet 1:21:51.100,1:21:58.000 you need companies to help you do it.[br]You can’t do it by yourself. 1:21:58.100,1:22:06.000 So if you want to have a website, you need[br]the support of an ISP or a hosting company 1:22:06.100,1:22:09.000 and you need a domain name registrar. 1:22:09.100,1:22:14.400 You need them to continue[br]to let you do what you’re doing. 1:22:14.500,1:22:20.700 So you’re doing it effectively[br]on sufferance, not by right. 1:22:20.900,1:22:25.800 And if you want to receive money,[br]you can’t just hold out a can. 1:22:25.900,1:22:33.000 You need the cooperation[br]of a payment company. 1:22:37.700,1:22:45.800 And we saw that this makes all of our[br]digital activities vulnerable to suppression. 1:22:45.900,1:22:49.000 We learned this when the United States government 1:22:49.100,1:22:54.000 launched a distributed denial of service[br]attack [DDoS] against WikiLeaks. 1:22:54.100,1:23:00.900 Now I’m making a bit of a joke because[br]the words “distributed denial of service attack” 1:23:01.000,1:23:05.000 usually refer to a different kind of attack. 1:23:05.100,1:23:09.000 But they fit perfectly with[br]what the United States did. 1:23:09.000,1:23:16.000 The United States went to the various kinds[br]of network services that WikiLeaks depended on 1:23:16.100,1:23:22.400 and told them to cut off[br]service to WikiLeaks. And they did. 1:23:22.500,1:23:27.300 For instance, WikiLeaks had rented[br]a virtual Amazon server 1:23:27.800,1:23:35.000 and the US government told Amazon: “cut off[br]service for WikiLeaks.” And it did, arbitrarily. 1:23:36.000,1:23:41.400 And then, Amazon had certain domain names[br]such as wikileaks.org 1:23:41.700,1:23:47.000 the US government tried to get[br]all those domains shut off. 1:23:47.100,1:23:53.000 But it didn’t succeed, some of them were[br]outside its control and were not shut off. 1:23:55.000,1:24:02.500 Then, there were the payment companies.[br]The US went to PayPal and said: 1:24:02.600,1:24:07.300 “Stop transferring money to WikiLeaks[br]or we’ll make life difficult for you.” 1:24:07.400,1:24:11.000 And PayPal shut off payments to WikiLeaks. 1:24:11.100,1:24:18.000 And then it went to Visa and Mastercard and[br]got them to shut off payments to WikiLeaks. 1:24:18.100,1:24:27.000 Others started collecting money on WikiLeaks[br]behalf and their accounts were shut off too. 1:24:27.100,1:24:31.300 But in this case, maybe something can be done. 1:24:31.600,1:24:38.000 There’s a company in Iceland which began[br]collecting money on behalf of WikiLeaks 1:24:38.100,1:24:41.700 and so Visa and Mastercard shut off its account; 1:24:41.800,1:24:46.000 it couldn’t receive money[br]from its customers either. 1:24:46.100,1:24:51.700 Now, that business is suing Visa and[br]Mastercard apparently under European Union law 1:24:51.800,1:24:56.600 because Visa and Mastercard[br]together have a near-monopoly. 1:24:56.700,1:25:01.500 They’re not allowed to arbitrarily[br]deny service to anyone. 1:25:01.600,1:25:05.000 Well, this is an example[br]of how things need to be 1:25:05.100,1:25:10.500 for all kinds of services[br]that we use in the Internet. 1:25:10.700,1:25:17.000 If you rented a store to hand out[br]statements of what you think 1:25:17.100,1:25:22.400 or any other kind of information[br]that you can lawfully distribute 1:25:22.500,1:25:27.800 the landlord couldn’t kick you out just[br]because he didn’t like what you were saying. 1:25:27.900,1:25:32.800 As long as you keep paying the rent,[br]you have the right to continue in that store 1:25:32.900,1:25:37.000 for a certain agreed-on period[br]of time that you signed. 1:25:37.100,1:25:41.000 So you have some rights[br]that you can enforce. 1:25:41.100,1:25:44.300 And they couldn’t shut off[br]your telephone line 1:25:44.400,1:25:48.500 because the phone company[br]doesn’t like what you said 1:25:48.600,1:25:55.000 or because some powerful entity didn’t like[br]what you said and threatened the phone company. 1:25:55.100,1:26:03.300 No! As long as you pay the bills[br]and obey certain basic rules 1:26:03.400,1:26:11.000 they can’t shut off your phone line.[br]This is what it’s like to have some rights! 1:26:11.100,1:26:18.300 Well, if we move our activities from[br]the physical world to the virtual world 1:26:18.700,1:26:27.000 then either we have the same rights in the[br]virtual world, or we have been harmed. 1:26:28.000,1:26:37.000 So, the precarity of all our Internet activities[br]is the last of the menaces I wanted to mention. 1:26:37.100,1:26:46.000 Now I’d like to say that for more information[br]about free software, look at GNU.org. 1:26:46.100,1:26:52.400 Also look at fsf.org, which is the website[br]of the Free Software Foundation. 1:26:52.500,1:26:58.400 You can go there and find many ways[br]you can help us, for instance. 1:26:58.500,1:27:03.500 You can also become a member of the Free[br]Software Foundation through that site 1:27:03.600,1:27:11.100 if you're going to do e-commerce.[br]If you'd like to join and pay cash 1:27:11.200,1:27:14.100 right here you can do that too.[br]I've got cards you can fill out. 1:27:14.200,1:27:24.000 There is also the Free Software Foundation[br]of Europe fsfe.org. You can join FSFE also. 1:27:24.500,1:27:28.000 Can you accept membership in cash? 1:27:28.100,1:27:31.000 Is there someone who wants to join right now? 1:27:31.100,1:27:37.000 Ok, so you can join FSFE also[br]paying with cash. 1:27:39.000,1:27:42.000 Now it's time and, by the way 1:27:42.100,1:27:47.700 I know the case of the FSF[br]we get most of our funds from members 1:27:47.800,1:27:53.000 so joining is really important[br]and probably for FSFE as well. 1:27:53.100,1:27:57.000 Now it's time for me to raise funds[br]in another way. 1:27:57.100,1:28:04.000 This is an adorable gnu[br]that needs a home. 1:28:05.000,1:28:11.400 And I'm going to auction it on behalf[br]of the Free Software Foundation. 1:28:11.800,1:28:17.000 If you buy the gnu, I'll sign[br]a card for you, if you like 1:28:17.600,1:28:22.000 and if you have a penguin[br]you need to get a gnu 1:28:22.100,1:28:28.000 because as we all know a penguin[br]can hardly function without a gnu. 1:28:31.000,1:28:38.000 When you bid, please wave your arm[br]and shout the quantity you are bidding 1:28:38.100,1:28:40.600 so that I notice you. 1:28:40.700,1:28:44.000 If you are bidding, I think you[br]want me to notice that you're bidding. 1:28:46.000,1:28:51.000 The FSF can accept payments[br]either in cash or with a credit card. 1:28:51.100,1:28:56.000 If the credit card works for ordering[br]by telephone then it won't work with us. 1:28:57.000,1:29:03.000 So, I'm going to start with 20 euros.[br]Do I get 20 euros? 1:29:03.600,1:29:07.000 I've got 20 euros, do I have 25? 1:29:09.100,1:29:12.000 How much? 1:29:16.000,1:29:20.000 Trente?[br]Ok, I've got 30 euros, do I have 35? 1:29:21.100,1:29:24.800 How much?[br]I've got 35, do I get 40? 1:29:25.000,1:29:28.200 I have 42 1:29:32.000,1:29:36.000 I have 42 euros, do I have 50? 1:29:36.800,1:29:40.400 How much?[br]I've got 50, do I get 60? 1:29:46.000,1:29:49.000 I've got 60, do I get 70? 1:29:52.100,1:29:56.000 How much?[br]I've got 70, do I get 80? 1:30:02.000,1:30:05.000 I've got 80, do I get 90? 1:30:05.100,1:30:11.000 I've got 80 euros, do I get 90[br]for this adorable gnu? 1:30:14.400,1:30:20.000 How much?[br]I've got 100 euros, do I get 110? 1:30:25.000,1:30:29.000 I've got 110, do I get 120? 1:30:30.000,1:30:34.000 I've got 120, do I get 130? 1:30:39.000,1:30:46.000 I've got 130, do I get 140? 1:30:46.100,1:30:51.000 How much?[br]I've got 140, do I get 150? 1:30:54.700,1:30:58.000 I've got 150, do I get 160? 1:30:58.500,1:31:02.000 I've got 160, do I get 170? 1:31:05.000,1:31:10.000 How much?[br]I've got 170, do I get 180? 1:31:14.100,1:31:18.200 Do you bid?[br]I've got 200 1:31:25.000,1:31:29.000 I've got 200, do I get 210? 1:31:32.600,1:31:36.000 I've got 210, do I get 220? 1:31:44.000,1:31:49.800 I've got 220, do I get 230? 1:31:49.900,1:31:54.600 Do I get 230 for this adorable gnu[br]that needs a home? 1:31:54.700,1:32:00.000 Do I get 230 to the Free Software[br]Foundation to defend freedom? 1:32:01.700,1:32:05.000 Last chance to bid. How much? 1:32:06.200,1:32:10.000 I've got 230, do I get 240? 1:32:14.000,1:32:17.100 I've got 240, do I get 250? 1:32:20.000,1:32:23.500 For this adorable gnu[br]to defend freedom? 1:32:23.600,1:32:28.000 How much?[br]I've got 300 1:32:32.000,1:32:44.000 I've got 300, do I get 320 for this[br]adorable gnu to defend freedom? 1:32:46.500,1:32:53.000 I've got 320, do I get 340? 1:32:55.600,1:33:00.000 How much? 340?[br]I've got 340, do I get 360? 1:33:04.000,1:33:08.000 What? I've got 340. 1:33:09.000,1:33:14.100 No, no I don't want to go up by such[br]small increments, we'll be here all night 1:33:14.200,1:33:18.000 I've got 340, do I get 360? 1:33:19.600,1:33:23.000 I've got 360, do I get 380? 1:33:23.100,1:33:30.000 I've got 380, do I get 400? 1:33:30.100,1:33:34.500 to defend freedom?[br]for this adorable gnu, do I get 400? 1:33:34.700,1:33:41.000 I've got 380, do I get 400?[br]Last chance to bid, 400 or more. 1:33:41.100,1:33:46.000 Last chance, going... 1:33:46.500,1:33:54.200 I've got 400, do I get 420? 1:33:57.100,1:34:07.000 How much?[br]I've got 420, do I get 440? 1:34:07.800,1:34:13.000 Last chance to bid 440 or more[br]for this adorable gnu. 1:34:13.700,1:34:20.600 Do I get 440?[br]Last chance, going, going 1:34:21.000,1:34:25.000 sold for 420. 1:34:29.200,1:34:37.700 Please note that there are stickers[br]which are gratuit to take. 1:34:37.800,1:34:40.300 Please take as many as you can[br]and make good use of. 1:34:40.400,1:34:48.700 There are also various small things[br]to sell, like badges and elegant pins 1:34:48.900,1:34:51.600 and the money supports[br]the Free Software Foundation. 1:34:51.700,1:34:53.000 Anyway now it's time for me[br]to answer questions.